SECURE MY CODE AGAINST SIDE-CHANNEL ATTACKS

Nowadays cryptographic algorithms and protocols are at the heart of billions of electronic devices’ security. Information stored in embedded devices like secure elements, such devices are potentially exposed to numerous attacks if the cryptographic algorithms are not thoroughly protected. All of your security architecture relies on the secrecy of the key. Side-channel analysis is a powerful technique known for years that allows to recover secret keys on hardware devices. It has been shown recently that it concerns both implementations on secure devices as well as software implementations like white-box cryptography implementations. Are you able to perform such attacks? Are your products and developments resistants to such attacks? This course will provide you with side-channel attack knowledge and show how your implementation can withstand these attacks. During this training we will cover the theoretical aspects of attacks, as well as counter-measures with demonstrations. The participant will develop their skills by practically running attacks on a non-secure implementation. They will then be guided to protect the code in different iterations that they will challenge with growing attack complexity until the proper side-channel resistance is reached. After the course you will be able to develop resistant implementations and challenge your own implementations against the most common side-channel attacks.